Vulnerabilities > CVE-2005-2087 - Resource Management Errors vulnerability in Microsoft IE and Internet Explorer
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 11 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | MS Internet Explorer (javaprxy.dll) COM Object Remote Exploit. CVE-2005-2087. Remote exploit for windows platform |
id | EDB-ID:1079 |
last seen | 2016-01-31 |
modified | 2005-07-05 |
published | 2005-07-05 |
reporter | k-otik |
source | https://www.exploit-db.com/download/1079/ |
title | Microsoft Internet Explorer javaprxy.dll COM Object Remote Exploit |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS05-037.NASL |
description | The remote host contains a version of the JView Profiler module that is vulnerable to a security flaw that may allow an attacker to execute arbitrary code on the remote host by constructing a malicious web page and enticing a victim to visit this web page. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18682 |
published | 2005-07-12 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18682 |
title | MS05-037: Vulnerability in JView Profiler Could Allow Code Execution (903235) |
code |
|
Oval
accepted 2014-02-24T04:00:14.351-05:00 class vulnerability contributors name Harvey Rubinovitz organization The MITRE Corporation name Jonathan Baker organization The MITRE Corporation name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Maria Mikhno organization ALTX-SOFT
description Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem. family windows id oval:org.mitre.oval:def:1326 status accepted submitted 2005-08-18T04:00:00.000-04:00 title IE5.01,SP4 Java Proxy COM Object Instantiation Memory Corruption Vulnerability version 68 accepted 2014-02-24T04:00:18.533-05:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Maria Mikhno organization ALTX-SOFT
description Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem. family windows id oval:org.mitre.oval:def:1506 status accepted submitted 2005-12-26T09:36:00.000-04:00 title IE6,SP1 Java Proxy COM Object Instantiation Memory Corruption Vulnerability version 67 accepted 2014-02-24T04:00:19.108-05:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Robert L. Hollis organization ThreatGuard, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc. name Maria Mikhno organization ALTX-SOFT
description Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem. family windows id oval:org.mitre.oval:def:1518 status accepted submitted 2005-12-26T09:36:00.000-04:00 title IE6:S03 Java Proxy COM Object Instantiation Memory Corruption Vulnerability version 71 accepted 2014-02-24T04:03:27.734-05:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Maria Mikhno organization ALTX-SOFT
description Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem. family windows id oval:org.mitre.oval:def:793 status accepted submitted 2005-12-26T09:36:00.000-04:00 title IE6:XP,SP2 Java Proxy COM Object Instantiation Memory Corruption Vulnerability version 66
Saint
bid | 14087 |
description | Internet Explorer Javaprxy.dll heap overflow |
id | win_patch_ie_javaprxy |
osvdb | 17680 |
title | ie_javaprxy |
type | client |
References
- http://www.microsoft.com/technet/security/advisory/903144.mspx
- http://www.auscert.org.au/render.html?it=5225
- http://www.kb.cert.org/vuls/id/939605
- http://www.securityfocus.com/bid/14087
- http://www.osvdb.org/17680
- http://securitytracker.com/id?1014329
- http://secunia.com/advisories/15891
- http://www.us-cert.gov/cas/techalerts/TA05-193A.html
- http://www.securityfocus.com/archive/1/404055
- http://www.kb.cert.org/vuls/id/959049
- http://www.vupen.com/english/advisories/2005/0935
- http://marc.info/?l=bugtraq&m=112006764714946&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21193
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A793
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1518
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1506
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1326
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-037